Debian Security Advisory
DLA-1733-1 wpa -- LTS security update
- Date Reported:
- 28 Mar 2019
- Affected Packages:
- wpa
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2016-10743.
- More information:
-
It was found that the fallback mechanism for generating a WPS pin in hostapd, an IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator, used a low quality pseudorandom number generator. This was resolved by using only the high quality os_get_random function.
For Debian 8
Jessie
, this problem has been fixed in version 2.3-1+deb8u7.We recommend that you upgrade your wpa packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS